Abstract
The soft computing methods play a vital role in identifying the malicious activities in the social network. The low cost solutions and the robustness provided by the soft computing in the identifying the unwanted activities make it a predominant area of research. The paper combines the soft computing techniques and frames an enhanced soft computing approach to detect the intrusion that cause security issues in the social network. The proffered method of the paper employs the enhanced soft computing technique that combines the fuzzy logic, decision tree, K means -EM and the machine learning in preprocessing, feature reduction, clustering and classification respectively to develop a security approach that is more effective than the traditional computations in identifying the misuse in the social networks. The intrusion detection system developed using the soft computing approach is tested using the KDD-NSL and the DARPA dataset to note down the security percentage, time utilization, cost and compared with the other traditional methods.
Publisher
Inventive Research Organization
Reference12 articles.
1. [1] Langin, Chet, and Shahram Rahimi. "Soft computing in intrusion detection: the state of the art." Journal of Ambient Intelligence and Humanized Computing 1, no. 2 (2010): 133-145.
2. [2] Singh, Raman, Harish Kumar, and R. Singla. "Review of soft computing in malware detection." Special issues on IP Multimedia Communications 1, no. 1 (2011): 55-60.
3. [3] Ahmad, Iftikhar, Azween Abdullah, Abdullah Alghamdi, and Muhammad Hussain. "Optimized intrusion detection mechanism using soft computing techniques." Telecommunication Systems 52, no. 4 (2013): 2187-2195.
4. [4] Jadhav, R. J., and U. T. Pawar. "Data mining for intrusion detection." International Journal of Power Control Signal and Computation 1, no. 4 (2005): 45-48.
5. [5] Shamshirband, Shahaboddin, Nor Badrul Anuar, Miss Laiha Mat Kiah, Vala Ali Rohani, Dalibor Petković, Sanjay Misra, and Abdul Nasir Khan. "Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks." Journal of Network and Computer Applications 42 (2014): 102-117.
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献